U2.1 Cables, Hubs, Sniffers

jjanesko
Mind Map by , created over 5 years ago

Nework Security Mind Map on U2.1 Cables, Hubs, Sniffers, created by jjanesko on 04/07/2014.

38
0
0
Tags
jjanesko
Created by jjanesko over 5 years ago
U2.1 Cables, Hubs, Sniffers - Hub Diagram
jjanesko
U2.5 SNMPv1 - SNMPv1 protocol stack
jjanesko
U2.3 TCP, Routers - Router Diagram
jjanesko
Ionic Bonding
Evangeline Taylor
Unit 5: Nuclear and Thermal Physics
Michael Priest
U2.6 SNMPv3
jjanesko
U2.4 LANs, MANs, WANs
jjanesko
U2.5 SNMPv1
jjanesko
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
jjanesko
U2.3 TCP, Routers, VLAN
jjanesko
U2.1 Cables, Hubs, Sniffers
1 Protocol for Ethernet
1.1 CSMA/CD
1.1.1 Carrier Sense
1.1.1.1 before sending, device checks to see if there is another device using network, if yes, it waits
1.1.2 multiple access
1.1.2.1 any device can use network when it is free
1.1.3 collision detection
1.1.3.1 after detecting collision, wait a random delay
1.1.3.1.1 if collision detected again, wait 2x as long and check (called "expontential backoff")
2 cabling
2.1 thick ethernet
2.1.1 10BASE 5, 10 Mbps, 500m
2.2 thin ethernet
2.2.1 10BASE2, 10Mbps, 200m
2.3 unshielded twisted pair
2.3.1 10BASE-T, 100-BASE -T, T=twisted pair
2.3.1.1 Cat 1 telephone
2.3.1.2 Cat 3, 10Mbps
2.3.1.3 Cat 5, 100Mbps
2.3.1.4 Cat5e, 1000Mbps
2.4 shielded twisted pair
2.4.1 Used for token ring, good for high interference
2.5 fibre-optic
2.5.1 1000 Mbps or higher
2.6 wireless LAN
2.6.1 Not type of cabling, but often used instead of. 11-150Mbps
2.7 OSI layer 1
2.8 4 fundamental threats
2.8.1 information leakage
2.8.2 integrity violation
2.8.3 denial of service
2.8.4 illegitimate use
2.8.5 safeguards
2.8.5.1 run cable through protective trunking
2.8.5.2 lockable, dedicated network closets
2.8.5.3 add electromagnetic shielding to cabling
2.8.5.4 run cabling through trunking with pressurized gas, have alarms for pressure loss
3 hubs
3.1 types
3.1.1 dumb
3.1.2 intelligent
3.1.2.1 regenerate signals for long network cables
3.1.2.2 monitor congestion, send alarms
3.1.2.3 remote monitoring
3.2 switched network (see note)

Attachments:

4 network interface card (NIC)
4.1 listening modes
4.1.1 non-promiscuous
4.1.1.1 only listens to traffic targeted for that device
4.1.2 promiscuous
4.1.2.1 listens to all traffice on the network
4.2 Physical interface that allows a device to listen to network traffice
5 sniffer
5.1 device listening to all traffic on a network
5.2 detection
5.2.1 method 1
5.2.1.1 1.send large volume of packets to non-existing network address
5.2.1.2 2. send an ICMP request to suspect device. If device is sniffing, it will be overwhelmed.
5.2.2 method 2
5.2.2.1 1. Send packet to unused IP address on network
5.2.2.2 2. Sniff network to see if any devices try to resolve DNS name
6 examples
6.1 thin ethernet
6.1.1 coaxial cable
6.1.2 build network by daisychaining nodes
6.1.2.1 computers connect directly to network cable
6.1.3 vulnerabilities
6.1.3.1 when one cable is damaged, the whole network fails
6.1.3.2 all devices on network receive data
6.1.3.3 easy to attach addtional devices
6.2 10BASE-T
6.2.1 connects devices to network via hub (see note)

Attachments:

6.2.2 vulnerabilities
6.2.2.1 all devices on network receive data (hub broadcasts)
6.2.2.2 easy to attach additional devices

Media attachments